1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
3 years ago
9

If your computers normal zoom is 100, but it looks like its at 500, how do you stop that? my invisioned thing isn't on, neither

is an accessebility. and right now, everything looks huge, I have to put the zoom on 50.
Computers and Technology
1 answer:
Alex Ar [27]3 years ago
7 0

Answer:

You just need to click over the desktop, move to the View, and then change to medium, if its the icon size.

However, if you feel your resolution requires screwing up, then you are required to do the right-click, and again over the Desktop and then move to the settings (screen resolution),

And if you by chance clicked on the magnifier utility, you can CTRL + ALT +DEL and you will also be required to shut the interface.

Explanation:

You just need to click over the desktop, move to the View, and then change to medium, if its the icon size.

However, if you feel your resolution requires screwing up, then you are required to do the right-click, and again over the Desktop and then move to the settings (screen resolution),

And if you by chance clicked on the magnifier utility, you can CTRL + ALT +DEL and you will also be required to shut the interface.

You might be interested in
True or False
steposvetlana [31]

Answer:

1. False

2. False

3. True

4. False

Explanation:

1. Folders are the containers to store files

2. The delete option deletes the file

3. Files are moved to recycle bin after being deleted, and can be permanently deleted from recycle bin

4. "MS-DOS was the main operating system for IBM PC compatible personal computers during the 1980s, from which point it was gradually superseded by operating systems offering a graphical user interface (GUI), in various generations of the graphical Microsoft Windows operating system."

<em>source for #4: Wikipedia</em>

3 0
3 years ago
Công dụng của đồng hồ đo điện:vôn kế, ampe kế, oát kế
Lostsunrise [7]

Answer:

I wonder what are you saying?

Explanation:

Please give me brainliest :)

4 0
3 years ago
__________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea
Ludmilka [50]

Answer: 3) Information extortion

Explanation:

Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.

  • Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
  • Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
  • Thus, the correct option is option(3).
5 0
3 years ago
Summarize why understanding the differences between surface culture and deep culture may inform your knowledge, skills, and prof
lorasvet [3.4K]

Answer: By understanding the basic cultural values of the individual such as looks and talk. Also understanding the core values of the individual such as attitude, beliefs and religion. It would improve the behavior in your professional and cultural relationship with individuals in your workplace.

Explanation:

8 0
3 years ago
How bout these chose your fave for bnha
VARVARA [1.3K]
The third one is mine
6 0
3 years ago
Read 2 more answers
Other questions:
  • Radiation requires a heated liquid to transfer energy. Please select the best answer from the choices provided T F
    10·2 answers
  • How many bits are required to address a 1mx8 main memory if main memory is byte addressable?
    6·1 answer
  • from january 2005 through july 2015, approximately how many electronic data records in the United States were breached, exposing
    13·1 answer
  • Write a program that does the following: • Alphabetizes a list of small (non-capital) letters. For consistency, make the string
    14·1 answer
  • What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?
    12·1 answer
  • How do emotions affect purchasing decisions?
    6·1 answer
  • The purpose of a malfunction indicator lamp (MIL) is to:
    12·1 answer
  • What dd command would you use to copy the contents of a partition named /dev/drive1 to another partition, called /dev/backup?
    6·1 answer
  • How do i use a computer (i'm 99999 years old)
    8·2 answers
  • What applications would you pin to your taskbar, why?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!